UM

Browse/Search Results:  1-10 of 10 Help

Filters    
Selected(0)Clear Items/Page:    Sort:
Adaptive code embedding for reversible data hiding in encrypted images Conference paper
Proceedings - International Conference on Image Processing, ICIP, Beijing, PEOPLES R CHINA, SEP 17-20, 2017
Authors:  Yi S.;  Zhou Y.
Favorite  |  View/Download:7/0  |  Submit date:2018/12/21
Adaptive Code Embedding  Encrypted Image  Privacy Protection  Reversible Data Hiding  
Adaptive image encryption for high capacity reversible data hiding Conference paper
2017 IEEE Conference on Dependable and Secure Computing, Taipei, Taiwan, August 7—10, 2017
Authors:  Choi K.-C.;  Pun C.-M.
Favorite  |  View/Download:5/0  |  Submit date:2019/02/14
Burrow's-wheeler Transform  Generalized Integer Transform  Image Encryption  Lossless Data Hiding  
Reducing the ciphertext expansion in image homomorphic encryption via linear interpolation technique Conference paper
2015 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2015, Orlando, FL, DEC 13-16, 2015
Authors:  Li Y.;  Zhou J.;  Li Y.;  Au O.C.
Favorite  |  View/Download:4/0  |  Submit date:2018/12/22
Ciphertext Expansion  Homomorphic Encryption  Linear Interpolation  
An improved reversible data hiding in encrypted images Conference paper
2015 IEEE China Summit and International Conference on Signal and Information Processing, ChinaSIP 2015 - Proceedings, Chengdu, China, 12-15 July 2015
Authors:  Yi S.;  Zhou Y.
Favorite  |  View/Download:9/0  |  Submit date:2018/12/21
Histogram Shifting  Image Encryption  Prediction Error  Reversible Data Hiding  
A new reversible data hiding algorithm in the encryption domain Conference paper
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics, San Diego, CA, OCT 05-08, 2014
Authors:  Yi S.;  Zhou Y.;  Pun C.-M.;  Chen C.L.P.
Favorite  |  View/Download:5/0  |  Submit date:2018/12/21
Differential Attack  Encryption Domain  Reversible Data Hiding  
Image encryption using 2D logistic-sine chaotic map Conference paper
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics, San Diego, CA, OCT 05-08, 2014
Authors:  Hua Z.;  Zhou Y.;  Pun C.-M.;  Chen C.L.P.
Favorite  |  View/Download:8/0  |  Submit date:2018/12/21
Cascade Chaotic System  Chaotic Map  Data Encryption  Pseudorandom Number Generator (Prng)  
Image encryption in the wavelet domain Conference paper
Proceedings of SPIE - The International Society for Optical Engineering, Baltimore, MD, APR 29-30, 2013
Authors:  Bao L.;  Zhou Y.;  Chen C.L.P.
Favorite  |  View/Download:6/0  |  Submit date:2018/12/21
Discrete Wavelet Transform  Image Encryptio  
The hardware thread interface design and adaptation on dynamically reconfigurable SoC Conference paper
Proceedings - 2009 International Conference on Embedded Software and Systems, ICESS 2009
Authors:  Wang Y.;  Chen W.-N.;  Wang X.-W.;  You H.-J.;  Peng C.-L.
Favorite  |  View/Download:4/0  |  Submit date:2019/01/16
Hardware thread  Interface adaptation  Stub thread  
On Improving the Lightweight Video Encryption Algorithms for Real-time Video Transmission Conference paper
3rd International Conference on Communications and Networking in China, ChinaCom 2008, Hangzhou, China, 25-27 Aug. 2008
Authors:  Simon Fong
Favorite  |  View/Download:6/0  |  Submit date:2019/02/13
Idea  Mpeg Video Encryption  Multimedia Data Security  
On Designing a Flexible E-Payment System with Fraud Detection Capability Conference paper
Proceedings - IEEE International Conference on E-Commerce Technology, CEC 2004, San Diego, CA, USA, USA, 6-9 July 2004
Authors:  Antoinette Leung;  Zhuang Yan;  Simon Fong
Favorite  |  View/Download:6/0  |  Submit date:2019/02/13